Delay efficient opportunistic routing in asynchronous multi-channel cognitive radio networks

Size: px
Start display at page:

Download "Delay efficient opportunistic routing in asynchronous multi-channel cognitive radio networks"

Transcription

1 J Comb Optim 2015) 29: DOI /s y Delay efficient opportunistic routing in asynchronous multi-channel cognitive radio networks Zhipeng Cai Yueming Duan Anu G. Bourgeois Published online: 16 May 2013 Springer Science+Business Media New York 2013 Abstract In this paper, we are interested in designing efficient distributed opportunistic routing protocols for multi-hop multi-channel cognitive radio networks CRNs). In CRNs, secondary users SUs) access unused primary channels opportunistically, which induces considerable end-to-end delays for multi-hop routing. The primary cause of the delay overhead is that the set of available channels change dynamically over time due to the activities of primary users, making it challenging to effectively explore the spectrum diversity. Our approach towards working with such a dynamic network is to construct a cross-layer distributed opportunistic routing protocol. Our protocol jointly considers the channel sensing strategy, the forwarder selection for each SU, and the package division scheme on each link. We mathematically model the expected delay of each hop along the routing path. This delay model sheds lights on our expected end-to-end delay analysis, from which we develop a distributed algorithm to derive the system parameters for the opportunistic routing protocol. Extensive simulation results indicate the improved performance of our opportunistic routing protocol in terms of end-to-end delay, especially for CRNs with highly dynamic channel conditions. Keywords Cross-layer routing Forwarding set Cognitive radio network Opportunistic routing Z. Cai B) Y. Duan A. G. Bourgeois Department of Computer Science, Georgia State University, Atlanta, GA 30303, USA zcai@cs.gsu.edu Y. Duan yduan1@cs.gsu.edu A. G. Bourgeois abourgeois@cs.gsu.edu

2 816 J Comb Optim 2015) 29: Introduction The spectrum is one of the most valuable resources available for wireless communication. However, numerous experimental studies show that the licensed spectrum is not efficiently used in both the time and space dimension, leading to a phenomenon referred to as spectrum holes Akyildiz et al. 2006). On the contrary, communications over unlicensed spectrum become more and more overcrowded due to the tremendous growth of wireless applications. The inefficient utilization of licensed spectrum and crowded unlicensed spectrum necessitate a new communication paradigm, Cognitive Radio Networks CRNs), in order to counteract this issue. The idea of CRNs is to equip Secondary Users SUs) with Cognitive Radios CRs) that are able to sense and hop to different channels opportunistically and dynamically. Exploiting the flexibility of the CRs to enable wireless nodes to dynamically access the spectrum and utilize the spectrum holes has proven to be a promising paradigm Akyildiz et al. 2006). In CRNs, one important constraint is that the data transmitted on any channel by SUs should not affect the communications of primary users PUs), or such interference should be limited and constrained by some predefined thresholds. These constraints introduce a myriad of challenges to the protocol design for CRNs. One of the most significant challenges is to minimize the end-to-end delay in multi-hop CRNs. In this framework, the set of available channels is dynamically changing over time and varies from node to node. To further complicate matters, such heterogeneity is usually difficult, if not impossible, to predict accurately in real time. Since each SU must find an idle channel prior to forwarding the packet to its neighbors in large scale multihop CRNs, additional delays are incurred at each relay node along the path from the source to the destination. Unfortunately, most existing research for delay analysis focuses on single hop CRNs Wang et al. 2010). This type of analysis cannot be easily extended to multi-hop scenarios. The works in Ren et al. 2010, 2012) theoretically analyze multi-hop delay in CRNs from the perspective of connectivity. Most recently, Liu et al. 2011) provides an opportunistic routing protocol for multi-hop CRNs that jointly considers channel selection and sensing. However, their designs only consider local information, which do not work well for heterogenous CRNs i.e., the spectrum holes are not uniform). Our design in this paper studies the end-to-end delay from a global perspective, which can adapt robustly to various CRNs with non-uniform spectrum holes. When considering a multi-hop multi-channel CRN, the logical topology of the whole network is highly dynamic and often disconnected at a given time instance. Moreover, the available time for a secondary link over a primary channel changes dynamically and may be shorter than the time needed to finish a complete packet transmission, i.e., the transmission of SUs can be interrupted by PUs at any time. For these reasons, computing a fixed routing path for a session is clearly not a good choice. The variable nature of CRNs motivates the use of opportunistic routing since it can potentially adapt well to the real-time channel availabilities. With opportunistic routing, packets may transverse the network over different paths and even possibly over different channels for the same link. This leads to two problems to solve in order to design an opportunistic routing protocol for multi-hop multi-channel CRNs. The

3 J Comb Optim 2015) 29: first is how to detect and choose a good channel in real time. Often, the quality of channels differs even for the same SU, and the same channel may have different idle distribution for different SUs. Moreover, the length of idle periods may be different for the same SU on the same channel. Adaptively choosing an idle channel under such high channel diversity is challenging. The second problem is how to detect and select a good forwarder in real time. While the sender and forwarder should have a common idle channel, the forwarder should have a relatively low expected delay to the sink. Identifying a forwarder that meets these conditions is not trivial, especially in a CRN. In this paper, we develop a cross-layer routing method for a multi-channel multihop CRN, and aim to minimize the delay from the source to a common destination, or sink. For practical consideration, our design does not assume the network is synchronized. We employ the idea of opportunistic forwarding to reduce single hop delays, thus reducing the overall end-to-end delay significantly. Specifically, each SU jointly selects the channel and next hop for packet forwarding. We divide the joint selection process into three stages, with an accurate model for the delay of each stage. Based on this fine-grained design and systematic delay analysis, the delay to the sink is significantly reduced through dynamic programming technology. Our contributions in this paper are as follows. First, we design a routing protocol for asynchronous multi-channel multi-hop CRNs that is easy to implement and delay efficient. Second, the delay to the sink for each packet from different SUs is explicitly and accurately modeled, and we present a low complexity heuristic algorithm with the objective of minimizing the delay, which obtains a solution close to optimal one. Finally, we evaluate the performance of our protocol via both theoretical analysis and extensive simulations. The remainder of the paper is organized as follows. In Sect. 2, we provide a comprehensive literature review related to the delay problem in CRNs. In Sect. 3, we describe the system model and introduce the opportunistic forwarding protocol. In Sect. 4, we divide the forwarding protocol into three stages and analyze each one mathematically. In Sect. 5, we illustrate the performance of our algorithm and compare it against other algorithms through simulation results. We conclude the paper in Sect Related work Spectrum availability in CRNs is frequently changing, resulting in extensive delays, as SUs along the routing path must wait for the channel to be idle. To address this challenge, many researchers have looked towards both theoretical and practical solutions. With the objective of supporting delay sensitive communications of unlicensed users, Wang et al. 2012) studies the optimal admission control and channel allocation decisions in cognitive overlay networks. The authors formulate it into a Markov decision process problem and solve it by transforming the original formulation into a stochastic shortest path problem. Wang et al. 2010) considers a CRN where multiple SUs contend for spectrum usage with random access over available primary channels. In Chen et al. 2011), the authors explore the problem of minimizing queueing delays

4 818 J Comb Optim 2015) 29: for opportunistic access of multiple continuous time Markov channels. Each of these efforts focuses on delay performance in single-hop CRNs. For multi-hop CRNs, Ren et al. 2010) analyzes the multi-hop delay of ad hoc CRNs, where the transmission delay of each hop consists of the waiting time for the availability of the communication channel and propagation delay. With the help of the techniques from continuum percolation and ergodicity, the authors in Ren et al. 2010) establish the scaling law of the minimum multi-hop delay with respect to the source destination distance. Han and Yang 2010) derives an information propagation speed upper bound in CRNs. The derived upper bound is tight when the number of primary channels is large. Most recently, Liu et al. 2012) uses continuum percolation theory to investigate the scaling behavior of transmission delay in large scale ad hoc CRNs. They consider different scenarios of CRNs to obtain a wide range of theoretical results. For single channel multi-hop CRNs, Ji et al. in press) proposed a three-step unicast scheme based on a carefully constructed cell-based virtual backbone. The induced delay from their unicast scheduling algorithm scales linearly with the transmission distance between the source and the destination. Recently, the approach of opportunistic routing has also been widely employed. Opportunistic routing Biswas and Morris 2004) is a routing mechanism that takes advantages of the broadcast characteristic of wireless transmission, and is often used to compensate for unreliable links due to the dynamic wireless environment. In Kim et al. 2008), the authors employ opportunistic routing to minimize end-to-end delay and maximize the lifetime of wireless sensor networks. Opportunistic routing is also employed to minimize energy consumption by routing a single packet in Mao et al. 2011). Since opportunistic routing does not need prior setup of the route, it is more suitable for CRNs with frequent changes of spectrum availability. The authors in Khalife et al. 2008) are among the first to use opportunistic routing for CRNs. They proposed a novel probabilistic metric towards selecting the best path to the destination in terms of the spectrum/channel availability capacity. Their approach, however, does not account for spectrum availability time. In a CRN, both spectrum handoff and required transmission time can significantly impact network connectivity and routing. Hence, in Badarneh and Salameh 2011), the authors introduce a novel routing metric that jointly considers the spectrum availability of idle channels and the required CR transmission times over those channels. This metric aims at maximizing the probability of success PoS) for a given CR transmission, which consequently improves network throughput. In the analysis, they analytically derive a closed-form expression for the PoS based method on a stochastic model of PUs activities under the Rayleigh fading channel model. In Shiang and Schaar 2008), the authors propose an algorithm to determine the channel decision strategies of the neighboring CR users over time in order to identify the channels that are likely to be used by them. However, their algorithm requires extensive information exchange between neighbors and it is not clear how long the network would take to converge to the optimal solution. In Lin and Chen 2010), the authors proposed SAOR spectrum aware opportunistic routing) for a single-channel CRN. SAOR considers the opportunistic link characterized by successful transmission rate and channel availability. In practice, there is usually more than one channel available in a CRN, and it is important for the routing protocol to make

5 J Comb Optim 2015) 29: full utilization of all the channels in order to achieve lower end-to-end delay and higher throughput. In Khalife et al. 2011), the authors propose MSAOR multi-channel spectrum aware opportunistic routing) based on link delay analysis. The MSAOR algorithm attempts to broadcast packets on every channel of the CR link to exploit the benefits of multiple channels, thus reducing the link delay and further reducing the end-to-end delay. Their analysis shows that MSAOR achieves a lower link delay than SAOR. Liu et al. 2011) considers heterogeneous channel occupancy patterns, and introduces opportunistic routing into the CRN where the statistical channel usage and the physical capacity in the wireless channels are exploited in the routing decision. To support opportunistic transmissions in CRNs, Liu et al. 2011) further discusses how to predict and evaluate the channel utility when the SUs need to explore multiple channels and the sensing delay is significant in the relay operation. However, none of the above works Liu et al. 2011; Khalife et al. 2008; Badarneh and Salameh 2011; Lin and Chen 2010; Khalife et al. 2011; Liu et al. 2011; Cai et al. 2013, 2012; Ji et al. 2013) systematically and accurately model the expected end-to-end delay. In this paper, we aim to develop a distributed algorithm to derive the configuration for opportunistic routing with the objective of minimizing the expected end-to-end delay. 3 System model 3.1 Network elements and channel model We consider a static multi-hop multi-channel cognitive radio network CRN) with N secondary users SUs). Denote S ={s 1, s 2,...,s N } as the set of all SUs in the CRN, where s N is the destination of all the data packets, referred to as the sink. Assume there are K orthogonal channels that are licensed to the primary users in the CRN deployment area. Denote the set of channels as K ={c 1, c 2,...,c K }, further denote the bandwidth of c k as w k. Each SU s i is equipped with a half-duplex cognitive radio CR) that can access any of these K primary channels on the condition that the channel is available e.g., idle) to the associated node SU). All of the CRs can only stay on one channel at any time. During the idle state, i.e., there is no data transmission), the CRs of all SUs periodically hop on K channels in a round-robin manner to ensure fair channel utilization consideration. Once a SU has data packet to transmit, the corresponding CR senses the K channels to detect an idle channel to access. In order to achieve a desirable level for detection quality by PHY-layer sensing i.e., sensing accuracy) Kim and Shin 2008), assume a predefined amount of time t S is needed to accurately sense the channel and the CRs or SUs can only sense one channel at one time. In this paper, we assume the SUs employ uniform transmission power and the corresponding transmission range is R. Based on this assumption, the PU occupation of c k for s i is modeled as an independent and identically distributed alternation 0 idle) and 1 busy) process, and the holding time for the states of idle and busy is exponentially distributed with mean λ ik s) and μ ik s), respectively. When c k is idle for s i during time interval [t, t + τ], wesayc k is available to s i, which essentially

6 820 J Comb Optim 2015) 29: means that s i is able to access c k to transmit data under any primary constraints, and the data transmitted by any SU within the receiving range of s i during this time interval can be received and decoded successfully by s i. For the convenience of analysis, we assume the above mentioned exponential distributions for all the SUs on different channels are independent. Note that the values of parameters μ ik and λ ik depend not only on the traffic loads and the physical locations of primary users PUs) around s i, but also on the transmission power of s i. The methodology of parameters estimation is beyond the scope of this paper, please reference Kim and Shin 2008), Wellens et al. 2010) and Ren et al. 2009) for the detailed analysis about channel accessibility for SUs in CRNs. 3.2 Topology link and opportunistic forwarding link ForapairofSUss i and s j, a topology link Ren et al. 2010) exists between them if and only if di, j) R, where di, j) denotes the euclidian distance { between s i and s j. Denote E as the set of these topology links, i.e., E = e ij i, j } {1, 2,...,N}, di, j) R. Assume in the considered CRN, all SUs are topologically connected to the sink s N, i.e., for any s i, there exists at least one node sequence s i0, s i1,...,s ih, s ih+1, such that di l, i l+1 ) R for any 0 l h, where i 0 = i, and i h+1 = N. Unlike traditional ad-hoc wireless networks, whether two SUs can communicate with each other in a CRN depends not only on the physical distance between them, but also on the transmission activity of PUs, i.e., the availability of the channels. Thus, the ability of SUs to employ links in E for data transmission varies over time due to the activities of PUs. There are cases where some topology links present extremely low opportunity to SUs and should be judiciously employed. Let N i denote the set of SUs in the transmission range of s i, i.e., N i ={s j ds i, s j ) R}. Each SU s i selects a subset of N i as its forwarding set on channel k, which is denoted as F ik.we say eij k is an opportunistic forwarding link from s i to s j on channel k if e ij E and s j F ik.letf i = F i1, F i2,...,f ik ), and F = F 1, F 2,...,F N ), then the space of F i is F i = PN i ) K, and the space of F = F 1 F 2 F N, where PN i ) is the power set of N i. 3.3 Opportunistic forwarding To reduce the relaying delay of each hop, we utilize the idea of opportunistic forwarding from Biswas and Morris 2004) for multi-hop routing. Due to the broadcast nature of the wireless channel, signals transmitted by a source node can potentially be overheard by all the neighboring nodes. Thus opportunistic forwarding has the potential to reduce the data forwarding delay under a dynamic opportunistic) spectrum environment in CRNs. Without loss of generality, let us assume s i has a data packet to transmit to the sink s N at time t. In general, this packet should be transmitted to the sink through multi-hop routing, especially in large scale CRNs. For ease of description and analysis, we divide the single hop packet forwarding process into three stages, i.e., idle channel detection stage, forwarder detection stage and packet transmission stage.

7 J Comb Optim 2015) 29: In the idle channel detection stage, s i continuously senses one of K channels in each time duration of t S e.g., a sensing period). If s i senses any channel c k to be idle, then the CR of s i hops to c k and the channel detection stage is finished, otherwise, s i continues to sense for another duration of t S on another of the K channels. During each sensing period, the decision of which channel to sense has to be carefully chosen to reduce the overall delay. Denote u i as the sensing scheme of s i, and let U = { } u 1, u 2,...,u N, where the space of U is denoted as U. We will discuss how a node decides which channel to sense in Sect In the forwarder detection stage, s i uses channel c k for s i ) that was detected to be idle during the previous stage. At the beginning of this stage, s i starts broadcasting a probing message that includes its id. The time needed to transmit the probing message is denoted as t P. All nodes in N i sojourning on channel k can potentially hear the probing message. Assume that s j N i, and the CR of s j remains on channel k, which is idle for s j during the broadcast of the probing message, then s j can receive the probing message by s i successfully. Afterwards, s j checks whether it is in the forwarding set of s i on c k. We simply assume all nodes stores a list of nodes which indicate whether it is in their forwarding set, this can be implemented with local information exchange.) If it is, s j immediately replies with an ack on c k. Denote the time needed for an ack transmission as t A. At the same time, the CR of s j stops hopping and remains on c k for any following potential data transmission task. In the case that multiple CRs are tuned on c k and reply with acks simultaneously, we use a backoff scheme to avoid the ack-collision. The explicit back-off strategy will be discussed in Sect We assume the extra time needed for ack replying is t E. After each probing message, s i checks whether there is any ack from the nodes in F ik. Once an ack is received, the forwarder detection stage is finished. If no ack is received, s i repeatedly broadcasts probing messages and listens until an ack is successfully received. As we will show later, the choice of F ik significantly affects the overall expected delay to the sink, while the optimal choice of the forwarding set is not necessarily equal to N i. In Sect , we analyze how to choose the optimal forwarding set on each channel c k for all the SUs. During the last stage, s i transmits the data to s j on c k, which were determined in the second and first stages, respectively. To provide reliability, once s j receives the whole packet, it replies with an ack message. Forwarding is completed only if s i receives the ack message successfully. If the channel is sensed busy for either s i or s j, the transmission will be suspended. If the packet transmission on the opportunistic forwarding link eij k is interrupted by the activities of PUs, s i must retransmit the entire message again. Intuitively, the larger the size of the packet, the higher the probability that the transmission is interrupted, since longer continuous idle time on eij k is needed for successful transmission. Without loss of generality, let us assume the size of all packets is σ. To solve the above problem, we divide the packet into equal-size frames if σ is too big for the opportunistic forwarding link eij k. For each frame, an additional message size of ν is needed for practical consideration, i.e., protocol overheads for each packet. Let bij k denote the number frames the packet is divided into on the opportunistic forwarding link eij k. Then the space of bk ij

8 822 J Comb Optim 2015) 29: ] is N +.LetB k = [bij k, i = 1, 2,...,N, j = 1, 2,...,N, then the space of B k is denoted as B k = N+ N N. Further let B = B 1, B 2,...,B K ), then the space of B is denoted as B = B 1 B 2 B K. We discuss the packet division in detail in Sect Problem In this paper, we consider that a SU s i has a packet with size σ to deliver to the sink through multi-hop relaying in a K -channel CRN. According to the description in the previous subsection, the stochastic process with which the packet traverses the CRN from s i to the sink s N is jointly determined by the channel sensing scheme the first stage), opportunistic forwarding sets the second stage) of each SU and packet division strategies the third stage) over each opportunistic forwarding link. Our first objective is to minimize the expected delay of forwarding a packet of size σ from a source s i to the sink, which is denoted as D i U, F, B). Formally, given the topology of a static CRN, the number of channels K, the bandwidth w k of each channel c k and the opportunistic channel environments, i.e., λ ik and μ ik, we aim to solve the delay optimization problem, min U, F, B D i U, F, B). 4 Joint channel sensing and opportunistic forwarding 4.1 Local expected delay analysis In this subsection, we will first establish a recursive relationship for the expected delay from s i to the sink, i.e., the expression of D i U, F, B). According to the description of opportunistic forwarding in Sect. 3.3, we can naturally divide the analysis into three stages: idle channel detection, forwarder detection and packet transmission. For ease of analysis, we will discuss and analyze the time needed for each stage in a reverse order Packet transmission Assume s i has already chosen the forwarder node s j on channel c k in the second and first stages of opportunistic forwarding, respectively. As mentioned in Sect. 3.3, the size of frame on each opportunistic forwarding link should be carefully decided due to the dynamic nature of the links in CRN. If the frame size is chosen to be either too large or too small, then this will result in larger overall transmission delays. To avoid this overhead, we explicitly quantify the transmission delay as a function of the number of frames. Let us first analyze the probability θ ik t) that c k is idle for s i during any time duration t. As mentioned before, the states of idle and busy are exponentially distributed with mean λ ik s) and μ ik s), respectively, and these distributions are independent. Let α ik = λ ik λ ik +μ ik, then the probability that channel k is idle for any time instance is α ik. If c k is idle for s i for a given time instance, then due to the memoryless nature of

9 J Comb Optim 2015) 29: the exponential distribution, the probability that the idle state can continue another duration of t is e λ 1 t ik, thus, θ ik t) = α ik e λ 1 t ik. 1) Assume a packet of size σ is divided into bij k equal-size frames for transmission on opportunistic forwarding link eij k. For each frame, an idle duration of t = σ/bk ij + ν)/w k + t A is needed. Considering idle periods of s i on c k, for any duration of t, the probability that channel k is idle for s j is θ jk t). Channel k must be idle for both s i and s j in order for s i to transmit packets successfully to s j. Thus, the expected number of frames that can be forwarded to s j in an idle period on channel k from s i is δij k = λ ik θ jk t) = t λ ik λ 1 jk tλ jk + μ jk ) e λ t jk. 2) Finally, the expected time for forwarding bij k frames on the opportunistic forwarding link eij k is Here we consider the complicated case bk ij δij k results can be easily obtained) ) Tij k bk ij ) = bk ij b k ij λ ik + 1 δ k ij δ k ij = bk ij δij k λ ik + μ ik ) μ ik μ ik 1. For the one bk ij δ k ij < 1, similar = λ ik + μ ik )λ jk + μ jk )te 1 λ jk t b k ij λ ik λ jk μ ik, 3) where t = σ/bij k + ν)/w k + t A. The first line of 3) indicates that if bij k frames need to be forwarded, the expected number of times of idle states is bk ij since δ k δij k ij frames can be forwarded in each idle period. The total expect time for forwarding should include b k ij δ k ij idle states and bk ij δij k Let dtk ij = 0, dbij k we have 1 busy states. σ z = 1 + 2λ jk w k 1 + 4λ jk ν/w k + t A since b k ij N+, the optimal value of b k ij minimizing T k ij is, b k ) 4) ij = argmin { } T ij k x). 5) x z, z

10 824 J Comb Optim 2015) 29: The above analysis uniquely defines the optimal packet division scheme B over all the opportunistic forwarding links. The minimum expected time needed for transmiting a packet of size σ on the opportunistic forwarding link e k ij is determined as well. According to 4) and 5), B depends only on the channel bandwidth of each channel and the mean time of idle periods on each channel for different SUs, which are all given parameters in this paper Forwarder detection Now assume s i has already detected an idle channel c k for itself in the first stage. Next it hops to c k and starts the forwarder detection on this channel. Thus, the following discussion is based on the assumption that s i hops onto c k, which is idle for s i at this moment. Before the analysis, assume that the forwarding set F ik of s i on c k is already given, where F ik N i. Moreover, as mentioned in Sect. 3.3, a back-off scheme has to be provided for the SUs in F ik to avoid possible ack-collision. Without loss of generality, assume the SUs in F ik are prioritized and sorted as s i1, s i2,...,s i Fik. From the viewpoint of s i, s ij has higher priority than s ij and thus has a shorter backoff time than s j if 1 j < j F ik. We will next focus on how to select the forwarding set F ik and how to prioritize the SUs in F ik. Let t I = t P + t E + t A. In any duration of t I, s i broadcasts a probing message and it can receive an ack message successfully, if and only if in this time duration, c k is idle for s i and at least one SU in F ik. Now assume in time interval [t, t + t I ], c k is idle for s i and it broadcasts a probing message at time t. The probability φ ik that s i does not receive any ack message in time interval [t + t P, t + t I ] is equal to the probability that during any period of t I, c k is not idle for any SU in F ik. Notice that during the idle state, the CRs of all SUs periodically hop on K channels in a round-robin manner. Thus, φ ik = F ik j=1 1 1 ) K θ jkt I ) = F ik j=1 1 1 K α jke 1 λ jk t I ), 6) where α jk is defined in previous subsection. For ease of analysis, we first assume c k is always idle for s i during the probing-ack process. When s i starts to broadcast probing messages on channel k, the probability that the l-th node s l in F ik becomes the forwarder right after the h-th probing period is equal to the probability that c k is not idle for any SU in F ik during the past h 1 probing periods, and during the h-th one, c k is idle for s l while busy for any SU s j F ik, where j < l, i.e., l,h ik l,h ik = φh 1 ik l 1 1 K θ lkt I ) j=1 1 1 ) K θ jkt I ). 7)

11 J Comb Optim 2015) 29: The probability ψ i,k,l that s i forwards packets to the l-th node in F ik i.e., s il )on channel c k is ψ i,k,l = = = h=1 l,h ik θ lk t I ) l 1 j=1 K 1 F ik j=1 θ lk t I ) l 1 j=1 ) 1 K 1 θ jk t I ) ) ) 1 K 1 θ jk t I ) 1 1 K θ jk t I ) K 1 φ ik ) ). 8) Finally, under the assumption that c k is always idle for s i, the expected time needed for s i to find a forwarder on c k is, F ik ht I l,h ik = t I l=1 K 1 ) ) F ik j=1 1 K 1 θ jk t I ) h=1 = t I K 1 φ ik ). 9) Note that above analysis is under the assumption that c k is always idle for s i during the probing-ack process. In fact, the channel c k is alternatively idle and busy for s i with exponential distributions with mean λ ik and μ ik, respectively. Thus, for each expected idle period of λ ik, s i has to suspend probing for an expected duration of μ ik before the next opportunity of accessing a channel arises. Equivalently, for each λ ik t I iterations of probing-ack, s i has to wait for an expected time of μ ik for the next probing-ack. More [ ] specifically, let [x] + = 1if0< x < 1, else [x] + = x and further let z = λik +. t I Now considering the h in 9), when h [δz + 1,δ+ 1)z], expected additional time of δμ ik has to be accounted for, where δ N. Thus, the overall additional time for s i to finish probing on c k is δ+1)z δ=1 j=δz+1 φ j 1 ik δμ ik = μ ik δ=1 = μ ik 1 φ z ik 1 φ ik z 1 δφik δz φ j ik j=0 δ=1 δφ δz ik = μ ik 1 φ z ik 1 φ ik φ z ik 1 φ z ik )2 = φ z ik 1 φ ik )1 φ z ik )μ ik. 10)

12 826 J Comb Optim 2015) 29: According to above analysis, the actual expected time needed at s i for forwarder detection on the channel c k is d ik = t I K 1 φ ik ) + φik z 1 φ ik )1 φik z )μ ik. 11) Now assume the expected delay to the sink) of D j is given for any s ij F ik. Then, from the beginning of the second stage forwarder detection) at s i, the expected delay to forward the data packet to the sink is F ik D ik F ik ) = d ik + ψ i,k, j Tij k + D j) = j=1 t I + F ik l=1 θ lkt I ) l 1 j=1 φ z ik ) 1 K 1 θ jk t I ) Til k l) K 1 φ ik ) + 1 φ ik )1 φik z )μ ik, 12) where T k ij is determined in previous subsection. Now our objective is to minimize D ik, which not only depends on how to choose F ik from N i, but also on how to prioritize the SUs in F ik. For the prioritizing strategy, we have following theoretical result. Theorem 1 For any F ik N i, D ik F ik ) is minimized when s ij has higher priority than s ij if and only if Tij k + D j T k ij + D j, where s ij, s ij F ik. φik Proof Considering 12), both z 1 φ ik )1 φik z )μ ik and K 1 φ ik ) are independent from the order of the SUs in F ik. The argument we need to prove is that gf ik ) = Fik l=1 θ lkt I ) ) l 1 j=1 1 K 1 θ jk t I ) Til k + D l ) is minimized when s ij has higher priority than s ij if and only if T k ij + D j T k ij + D j. We prove this argument by contradiction. If the argument is not true, their must exist a pair of SUs s im and s in, where n = m + 1, in F ik that violates the argument above. Without loss of generality, assume T k im + D m > T k in + D n, and L is any prioritized list of SUs from F ik such that s im has higher priority than s in from the viewpoint of s i. Further, denote L as another prioritized list of SUs that is the same to L except that s im and s in are switched. Following we prove gl) gl ) 0. gl) gl ) = T k im + D m)θ mk t I ) +T k in + D n)θ nk t I ) m 1 l=1 m l=1 1 1 ) K θ lk t I ) 1 1 ) K θ lk t I )

13 J Comb Optim 2015) 29: T k in + D n)θ nk t I ) m 1 l=1 Tim k + D m)θ mk t I ) = θ mk t I )θ nk t I ) m 1 l=1 1 1 ) K θ lk t I ) 1 1 K θ nk t I ) ) m 1 l=1 1 1 ) K θ lk t I ) 1 1 ) K θ lk t I ) Tim k + D m Tin k D n) 0 13) According to above theorem, the back-off strategies of SUs in F ik can be easily determined according to their priorities from the viewpoint of s i. Considering the expression of D ik F ik ) in 12), the second term of 12) is minimized when F ik = N i. Due to the theoretic results of Kim et al. 2008), the first term of D ik F ik ) can be minimized in time complexity of O N i log N i ). However, the complexity of minimizing D ik F ik ) is O2 N i ). Based on the algorithm from Kim et al. 2008), we propose an algorithm with time complexity of O N i log N i ), which provides an efficient solution. Algorithm 1: Candidate-Forwarding-Set-Searching input : Sender index i, channel index k, sorted N i in increasing order of Tij k + D j, w k, μ ik, λ ik, D j for s j N i output: F ik 1 T min + ; 2 r 1; 3 S ; 4 for l 1 to N i do S S + { } 5 s l ; 6 if D ik S) <T min then 7 T min D ik S); 8 r l; return F ik = { 9 s i1, s i2,...,s i Fik } ; Idle channel detection To finish the analysis of the three-stage opportunistic forwarding, we now discuss the idle channel detection stage with channel sensing. For each channel sensing, a duration of t S is needed. After each sensing, if c k is sensed busy for s i, it has to sense for another time period of t S, and make a decision of which channel to sense; otherwise, s i can finish the channel detection stage and hops to c k for forwarder detection. In this section, we answer the question on how to select a channel to sense at each sensing period. Formally, assume the expected time for idle channel detection is Ti su i) under sensing scheme u i. The objective is to find the optimal sensing scheme ui to minimize

14 828 J Comb Optim 2015) 29: D i, i.e. solve following optimization problem, { u i = argmin D i u i ) = argmin Ti s u i) + u i U u i U K } g l u i )Dil l=1 14) where g l u i ) is the probability that s i hops to c l after the idle channel detection stage under sensing scheme u i, and the optimal value of Dil has been derived in the previous subsection. Denote xik h as the probability that c k will be sensed to be idle by s i after h times of channel sensing, if c k will be sensed at the h + 1th sensing period. Let x h = xi1 h, xh i2,...,xh ik ), then u i is a mapping from x h to K. At the beginning of the first sensing period, s i has no sensing result, or the latest sensing result is from a long time before, which means it is meaningless in practice Kim and Shin 2008), thus, in this paper we can safely assume xik 0 = λ ik λ ik +μ ik. Define P i,k X,Y t) as the probability that the state of c k for s i is Y at time { t + t under } the condition that the state of c k for s i is X at time t, where X, Y busy1), idle0), further let β ik = λ ik λ ik +μ ik, then due to the analysis in Kim and Shin 2008), P i,k X,Y t) = β ik 1 e λ ik+μ ik ) t ) X = 1, Y = 0, 15) where α ik is defined in Sect , and we further have { αik xik h = ) h = 1oru i x l ) = k, 1 l < h, P h i,k ζ)t S c k is busy at ζ th sensing, 1,0 } where ζ = argmax l {u i x l ) = k. According to 15) and 16), the space of x h is infinite, and the state of x h not only depends on x h 1, but also on the previous states and sensing decisions. Instead of providing an optimal solution for 14), we propose an adaptive greedy sensing scheme as follows, u i x h ) = argmin k { t S + D ik + 1 xik h )μ ik }. 17) Once a channel is sensed idle for s i, the idle channel detection stage is finished, otherwise, it updates x h according to 16) and continues to sense based on the above sensing scheme. We provide the following algorithm to evaluate the expected value of D i u i ) given u i in 17), in which ɛ is a threshold for accuracy control of the estimation of expected delay D i. 16) Theorem 2 The upper bound of the expected value of D i u i ) is min k {1,2,...,K } {α ik t S + β ik μ ik + D ik }.

15 J Comb Optim 2015) 29: Algorithm 2: Expected-Delay-Evaluation input : Sender index i, μ ik, k = 1, 2,...,K, {D i1, D i2,...,d ik } output: Expected delay from s i to the sink, i.e., D i 1 D = 0; 2 P = 1; 3 h = 1; } 4 D m = max {D i1, D i2,...,d ik ; 5 while PD m ɛ do 6 for k 1 to K do 7 update xik h according to 16); } 8 k = argmin k {t S + D ik + 1 xik h )μ ik ; 9 D = D + Pt S + xik h D ik); 10 P = P1 xik h ); 11 record that c k is busy at hth sensing; 12 h h + 1; 13 return D + ɛ; Proof Consider { 17), once s i received a packet, it will sense channel c k, where k = argmin k t S + D ik + 1 xik h 1 )μ ik }, and the expected time to wait for c k to be idle is α ik t S + β ik μ ik.ifc k is sensed busy and s i switches to a different channel c k in the following sensing period, the expected time to wait must be smaller compared to staying on c k. Thus, the upper bound of the expected value of D i u i ) is the expected time wait to c k to be idle together with D ik. 4.2 Global opportunistic routing tree construction In the previous subsection, we established a recursive relationship between a sender and its neighbors with respect to their expected delays to the sink. We also constructed the candidate channel set and the forwarding sets on different channels for the sender to reduce the expected delay, based on the delays of its neighbors to the sink. In this subsection, we present a distributed iterative based algorithm to reduce the expected delay to the sink for each SU as shown in Algorithm 3. As we can see, Algorithm 3 is distributed and each SU runs this algorithm until the candidate forwarder sets for each SU are stable. Initially, only the sink broadcast its expected delay i.e., 0) to its neighbors. Other SUs calculate their packet division scheme on different channels from line 8 to line 11. After that, once a SU in the CRN receives any expected delay value to the sink), it updates its forwarding sets on each channel and estimates the expected delay to the sink with Algorithm 1 and Algorithm 2, respectively. If the delay is reduced, then this information should be broadcast to its neighbors. Notice that this algorithm is a pre-configuration algorithm. We do not discuss how to schedule this information exchange e.g., broadcast) process. Assume each iteration h) is perfectly scheduled in Algorithm 3, then clearly the algorithm will convergence within a finite iterations since the opportunistic routing tree defined by the forwarding sets derived from Algorithm 3 is loop-free.

16 830 J Comb Optim 2015) 29: Algorithm 3: Opportunistic-Routing-Tree-Construction input : Second user index i, K, N i, w k, μ ik, λ ik, k = 1, 2,...,K output: F i1, F i2,...,f ik 1 h 0; 2 if i = N then 3 D h) i 0; 4 broadcast D h) i ; 5 return ; 6 else 7 D h) i ; 8 for k 1 to K do 9 for j N i do ) z = 2λ σ jk w λ jk k ν/w k +t ; A 10 bij k = argmin { } T k 11 x z, z ij x); 12 if receive expected delays from N i then 13 h h + 1; 14 update forwarding sets on each channels with algorithm 1; 15 update expected delay D h) i with algorithm 2; 16 if D h) i < D h 1) i then 17 broadcast D h) i ; 18 return F i1, F i2,...,f ik ; Remarks Notice it is possible that after running Algorithm 3, no nodes will use s i as a forwarder on channel k. Then s i does not need to hop to channel k when it is on the idle state, which means the K in6) should be further reduced. Then, the idle probability φ ik will also be increased. Thus, we can run Algorithm 3 again to prune the solution. We will demonstrate the benefit of this tuning in simulation section. 5 Simulation results In this section, we provide simulation results to illustrate the performance of our distributed routing protocol in terms of the delay to the sink. Since in our protocol, each hop forwarding is divided into three stages, we name this protocol three stage opportunistic routing TS-Opp-R). For the pruned version, we prevent SUs from hopping to the channels that their neighbors will not employ after running TS-Opp-R. We name this enhanced protocol as TS-Opp-R-Pruned. In the simulation, we compare our TS-Opp-R and TS-Opp-R-Pruned protocols with the following two algorithms: Deterministic Shortest Path Routing D-SP-R): In this routing protocol, each SU has only one fixed forwarding node. The shortest path was determined from using the well-known Bellman-Ford algorithm. The link length is derived from the expected single hop delay on each channel, and the SUs in the CRN always choose the best forwarder on some channel in terms of expected cumulated delay. We have the advantage of exploiting channel diversity and path diversity with opportunistic routing as compared to D-SP-R.

17 J Comb Optim 2015) 29: Aggressive Opportunistic Routing A-Opp-R): This algorithm is also an opportunistic routing, which is modified from Liu et al. 2011). In the protocol design of Liu et al. 2011), any one hop neighbor of a SU can potentially receive and forward the packet, i.e., they do not specify designated forwarders, which means their protocol does not guarantee loop-free routing. For this consideration, we modify their algorithm such that only the neighbors with smaller expected delay derived from our iterative Algorithm 3 and analysis in Sect. 4) can be employed as next hop forwarders. This modification essentially improved the delay performance compared to the original one. As the name implies, the SU selects all the neighbors with smaller expected delay as a forwarder. Through comparison to this protocol, we show the importance of carefully selecting the forwarders on different channels for different nodes, as analysed in Sect In our simulation, a static CRN with 400 SUs are randomly deployed over a 1,000 1,000 m area, where the sink is located at the bottom-left corner. The transmission range of SUs is set to 100m. The parameters t S, t P, t A and t C are set to 1, 2, 1, 0.5 and 1 ms, respectively. The bandwidth of each channel is randomly set within the interval [10, 55 Mbps]. The parameter ν is set to 2 bytes. Without specification, in the following simulation we set the number of channels to 5, the parameters λ ik and μ ik are set as a random number in the interval [30, 40 ms], and the packet size is set to 500 bytes. We first compare our algorithms with the other two for above mentioned default parameters settings as shown in Fig. 1. For ease of illustration, we permute the nodes according to the ascending order of the delay corresponding to the delay results of protocol TS-Opp-R-Pruned. As we can see, the performance of our protocols are better than that of both D-SP-R and A-Opp-R. Interestingly, the delay performance of A-Opp-R is even worse than D-SP-R, which further indicates the importance of carefully choosing forwarding sets during opportunistic routing. Also, the benefit of preventing the CRs of SUs from hopping to unnecessary channels in terms of reducing delay is significant. We next compare the average delay performance of these four algorithms for different number of channels, i.e., the number of channels vary from 2 to 10. Fig. 2a provides the overall comparison. A-Opp-R performs much worse than other three protocols. For clear comparison of the other three protocols, we narrow the delay window as shown in Fig. 2b. As we can see, with an increase in the number of channels, the average delay will first decrease, and after a unstable window, the average delay will continue increasing. The reason is that by increasing the number of channels, the nodes have more choice for forwarding, and they can employ a best channel for forwarding considering the overall delay performance. Additionally, the single hop delay will increase at the same time since the SUs hop on different channels during idle status. The issue of how to reduce the size of the unstable channel size window and find the optimal channel size and optimal channel hopping scheme for opportunistic forwarding will be considered in our future work. The average delay performance comparison results of these four algorithms with different channel availability are shown in Fig. 3. In this simulation, we adjust the

18 832 J Comb Optim 2015) 29: TS-Opp-R-Pruned TS-Opp-R D-SP-R A-Opp-R Delay to the sink ms) Permuated node indexes Fig. 1 Expected delay to the sink for all SUs Average delay to the sink ms) TS-Opp-R-Pruned TS-Opp-R D-SP-R A-Opp-R Number of channels a) Average delay to the sink ms) Fig. 2 Average delay with different number of channels TS-Opp-R-Pruned TS-Opp-R D-SP-R A-Opp-R Number of channels b) channel availability by changing the parameters λ ik and μ ik, e.g., for μ = 10 and λ = 30, we set λ ik and μ ik as a random value in the interval [10ms, 20ms] and [30ms, 40ms], respectively. In Fig. 3a, we set μ = 10 and measure the average delay with the increase of λ from 20 to 90.μ is set to 20, 30 and 40 for Fig. 3b, c, d, respectively. The larger the λ and the smaller the μ, the more degree of channel availability for SUs. As we can see, these protocols are all sensitive to λ and μ. Our protocols show significant improvement over the other two, especially under a highly dynamic channel environment. Moreover, the average delays of our protocols increases slower than other two protocols, with the reduction of channel availability. We lastly compare the average delay performance of these algorithms for different packet sizes. We vary the size of the packets from 200 1,000 bytes. As shown in Fig. 4, our protocols both outperform the other two algorithms in terms of average delays when considering the packet size. In fact, as the packet size increases, the

19 J Comb Optim 2015) 29: a) µ = 10. b) µ = 20. c) µ = 30. d) µ =40. Fig. 3 Average delay with different channel availability Lambda = λ) 6000 TS-Opp-R-Pruned TS-Opp-R D-SP-R A-Opp-R Average delay to the sink ms) Size of packet byte) Fig. 4 Average delay with different packet size rate of increase of average delay is much lower for our protocols as compared to the other two algorithms. This leads to an even greater improvement as the packet size increases.

20 834 J Comb Optim 2015) 29: Conclusion In this paper, we proposed a cross-layer distributed opportunistic routing protocol for multi-hop multi-channel CRNs. Specifically, our routing protocol works towards minimizing the overall expected end-to-end delay by jointly considering the channel sensing strategy, forwarder selection for each SU and packet division scheme on each link. We also provided a mathematical expected delay model, based on which we designed a distributed algorithm to determine system parameters for each SU during opportunistic routing. Note that, the overall framework can be extended to multiple end-to-end flows, however,multiple end-to-end flows will cause fewer spectrum opportunities since SUs will compete idle channel themselves. The most challenging part for the framework is how to decide the candidate forwarding set. In order to capture the forwarding set, more factors need to be taken into account. For example, load balance for each SU needs to be considered since we do not want an SU to be included in too many forwarding sets We also performed extensive simulations to evaluate the performance of our opportunistic routing protocol in terms of end-to-end delay, especially for CRNs with highly dynamic channel conditions. Results show that our routing protocols have lower delay, regardless of the number of channels, channel availability, or packet size, thus improving the overall performance. Acknowledgments This study is partly supported by the National Science Foundation NSF) under grants Nos. CNS and CNS References Akyildiz IF, Lee W, Vuran MC, Mohanty S 2006) NeXt generation dynamic spectrum access cognitive radio wireless networks: A survey. Computer Networks Journal 5013): Badarneh OS, Salameh HB 2011) Opportunistic routing in cognitive radio networks: exploiting spectrum availability and rich channel diversity, GLOBECOM, pp. 1 5 Biswas S, Morris R 2004) Opportunistic routing in multi-hop wireless networks. ACM SIGCOMM Comput Commun Rev 341):69 74 Cai Z, Ji S, He J, Bourgeois AG 2012) Optimal distributed data collection for asynchronous cognitive radio networks, ICDCS Cai Z, Ji S, He J, Wei L, Bourgeois AG 2013) Distributed and asynchronous data collection in cognitive radio networks with fairness consideration, IEEE Transactions on Parallel and Distributed Systems TPDS) Chen S, Tong L, Zhao Q 2011) Delay optimal multichannel opportunistic access. INFOCOM, pp Han C, Yang Y 2010) The information propagation speed upper bound in cognitive radio networks. GLOBECOM, pp. 1 5 Ji S, Beyah R, Cai Z 2013) Minimum-latency broadcast scheduling for cognitive radio networks, SECON Ji S, Uluagac A, Beyah R, Cai Z in press) Practical unicast and convergecast scheduling schemes for cognitive radio networks. J Comb Optim. doi: /s Khalife H, Ahuja S, Malouch N, Krunz M 2008) Probabilistic path selection in opportunistic cognitive radio networks, GLOBECOM, pp 1 5 Khalife H, Ahuja S, Malouch N, Krunz M 2011) Opportunistic Routing in Multi-Channel Cognitive Radio Networks, Communications and Information Technologies, pp Kim H, Shin KG 2008) Efficient discovery of spectrum opportunities with MAC-layer sensing in cognitive radio networks. IEEE Trans Mobile Comput 75): Kim J, Lin X, Shroff NB, Sinha P 2008) On maximizing the lifetime of delay-sensitive wireless sensor networks with anycast. INFOCOM, pp

A survey on broadcast protocols in multihop cognitive radio ad hoc network

A survey on broadcast protocols in multihop cognitive radio ad hoc network A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels

More information

Channel Sensing Order in Multi-user Cognitive Radio Networks

Channel Sensing Order in Multi-user Cognitive Radio Networks 2012 IEEE International Symposium on Dynamic Spectrum Access Networks Channel Sensing Order in Multi-user Cognitive Radio Networks Jie Zhao and Xin Wang Department of Electrical and Computer Engineering

More information

Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks

Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks Chunxiao Jiang, Yan Chen, and K. J. Ray Liu Department of Electrical and Computer Engineering, University of Maryland, College

More information

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS A Thesis by Masaaki Takahashi Bachelor of Science, Wichita State University, 28 Submitted to the Department of Electrical Engineering

More information

Efficient Method of Secondary Users Selection Using Dynamic Priority Scheduling

Efficient Method of Secondary Users Selection Using Dynamic Priority Scheduling Efficient Method of Secondary Users Selection Using Dynamic Priority Scheduling ABSTRACT Sasikumar.J.T 1, Rathika.P.D 2, Sophia.S 3 PG Scholar 1, Assistant Professor 2, Professor 3 Department of ECE, Sri

More information

Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks

Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks Page 1 of 10 Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks. Nekoui and H. Pishro-Nik This letter addresses the throughput of an ALOHA-based Poisson-distributed multihop wireless

More information

Channel Sensing Order in Multi-user Cognitive Radio Networks

Channel Sensing Order in Multi-user Cognitive Radio Networks Channel Sensing Order in Multi-user Cognitive Radio Networks Jie Zhao and Xin Wang Department of Electrical and Computer Engineering State University of New York at Stony Brook Stony Brook, New York 11794

More information

arxiv: v1 [cs.ni] 30 Jan 2016

arxiv: v1 [cs.ni] 30 Jan 2016 Skolem Sequence Based Self-adaptive Broadcast Protocol in Cognitive Radio Networks arxiv:1602.00066v1 [cs.ni] 30 Jan 2016 Lin Chen 1,2, Zhiping Xiao 2, Kaigui Bian 2, Shuyu Shi 3, Rui Li 1, and Yusheng

More information

Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks

Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks Yuqun Zhang, Chen-Hsiang Feng, Ilker Demirkol, Wendi B. Heinzelman Department of Electrical and Computer

More information

Chapter 2 On the Spectrum Handoff for Cognitive Radio Ad Hoc Networks Without Common Control Channel

Chapter 2 On the Spectrum Handoff for Cognitive Radio Ad Hoc Networks Without Common Control Channel Chapter 2 On the Spectrum Handoff for Cognitive Radio Ad Hoc Networks Without Common Control Channel Yi Song and Jiang Xie Abstract Cognitive radio (CR) technology is a promising solution to enhance the

More information

Imperfect Monitoring in Multi-agent Opportunistic Channel Access

Imperfect Monitoring in Multi-agent Opportunistic Channel Access Imperfect Monitoring in Multi-agent Opportunistic Channel Access Ji Wang Thesis submitted to the Faculty of the Virginia Polytechnic Institute and State University in partial fulfillment of the requirements

More information

Efficient Recovery Algorithms for Wireless Mesh Networks with Cognitive Radios

Efficient Recovery Algorithms for Wireless Mesh Networks with Cognitive Radios Efficient Recovery Algorithms for Wireless Mesh Networks with Cognitive Radios Roberto Hincapie, Li Zhang, Jian Tang, Guoliang Xue, Richard S. Wolff and Roberto Bustamante Abstract Cognitive radios allow

More information

Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks

Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Ying Dai and Jie Wu Department of Computer and Information Sciences Temple University, Philadelphia, PA 19122 Email: {ying.dai,

More information

Delay Performance Modeling and Analysis in Clustered Cognitive Radio Networks

Delay Performance Modeling and Analysis in Clustered Cognitive Radio Networks Delay Performance Modeling and Analysis in Clustered Cognitive Radio Networks Nadia Adem and Bechir Hamdaoui School of Electrical Engineering and Computer Science Oregon State University, Corvallis, Oregon

More information

Distributed Power Control in Cellular and Wireless Networks - A Comparative Study

Distributed Power Control in Cellular and Wireless Networks - A Comparative Study Distributed Power Control in Cellular and Wireless Networks - A Comparative Study Vijay Raman, ECE, UIUC 1 Why power control? Interference in communication systems restrains system capacity In cellular

More information

A new Opportunistic MAC Layer Protocol for Cognitive IEEE based Wireless Networks

A new Opportunistic MAC Layer Protocol for Cognitive IEEE based Wireless Networks A new Opportunistic MAC Layer Protocol for Cognitive IEEE 8.11-based Wireless Networks Abderrahim Benslimane,ArshadAli, Abdellatif Kobbane and Tarik Taleb LIA/CERI, University of Avignon, Agroparc BP 18,

More information

Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control

Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control Jianwei Huang Department of Information Engineering The Chinese University of Hong Kong KAIST-CUHK Workshop July 2009 J. Huang (CUHK)

More information

DISTRIBUTED INTELLIGENT SPECTRUM MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS. Yi Song

DISTRIBUTED INTELLIGENT SPECTRUM MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS. Yi Song DISTRIBUTED INTELLIGENT SPECTRUM MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS by Yi Song A dissertation submitted to the faculty of The University of North Carolina at Charlotte in partial fulfillment

More information

INTELLIGENT SPECTRUM MOBILITY AND RESOURCE MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS. A Dissertation by. Dan Wang

INTELLIGENT SPECTRUM MOBILITY AND RESOURCE MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS. A Dissertation by. Dan Wang INTELLIGENT SPECTRUM MOBILITY AND RESOURCE MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS A Dissertation by Dan Wang Master of Science, Harbin Institute of Technology, 2011 Bachelor of Engineering, China

More information

On Event Signal Reconstruction in Wireless Sensor Networks

On Event Signal Reconstruction in Wireless Sensor Networks On Event Signal Reconstruction in Wireless Sensor Networks Barış Atakan and Özgür B. Akan Next Generation Wireless Communications Laboratory Department of Electrical and Electronics Engineering Middle

More information

3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011

3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011 3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011 Asynchronous CSMA Policies in Multihop Wireless Networks With Primary Interference Constraints Peter Marbach, Member, IEEE, Atilla

More information

On the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing

On the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing 1 On the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing Liangping Ma arxiv:0809.4325v2 [cs.it] 26 Dec 2009 Abstract The first result

More information

Competitive Distributed Spectrum Access in QoS-Constrained Cognitive Radio Networks

Competitive Distributed Spectrum Access in QoS-Constrained Cognitive Radio Networks Competitive Distributed Spectrum Access in QoS-Constrained Cognitive Radio Networks Ziqiang Feng, Ian Wassell Computer Laboratory University of Cambridge, UK Email: {zf232, ijw24}@cam.ac.uk Abstract Dynamic

More information

Decentralized Cognitive MAC for Opportunistic Spectrum Access in Ad-Hoc Networks: A POMDP Framework

Decentralized Cognitive MAC for Opportunistic Spectrum Access in Ad-Hoc Networks: A POMDP Framework Decentralized Cognitive MAC for Opportunistic Spectrum Access in Ad-Hoc Networks: A POMDP Framework Qing Zhao, Lang Tong, Anathram Swami, and Yunxia Chen EE360 Presentation: Kun Yi Stanford University

More information

Dynamic Spectrum Access in Cognitive Radio Networks. Xiaoying Gan 09/17/2009

Dynamic Spectrum Access in Cognitive Radio Networks. Xiaoying Gan 09/17/2009 Dynamic Spectrum Access in Cognitive Radio Networks Xiaoying Gan xgan@ucsd.edu 09/17/2009 Outline Introduction Cognitive Radio Framework MAC sensing Spectrum Occupancy Model Sensing policy Access policy

More information

Coding aware routing in wireless networks with bandwidth guarantees. IEEEVTS Vehicular Technology Conference Proceedings. Copyright IEEE.

Coding aware routing in wireless networks with bandwidth guarantees. IEEEVTS Vehicular Technology Conference Proceedings. Copyright IEEE. Title Coding aware routing in wireless networks with bandwidth guarantees Author(s) Hou, R; Lui, KS; Li, J Citation The IEEE 73rd Vehicular Technology Conference (VTC Spring 2011), Budapest, Hungary, 15-18

More information

Stability Analysis for Network Coded Multicast Cell with Opportunistic Relay

Stability Analysis for Network Coded Multicast Cell with Opportunistic Relay This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 00 proceedings Stability Analysis for Network Coded Multicast

More information

Channel Hopping Algorithm Implementation in Mobile Ad Hoc Networks

Channel Hopping Algorithm Implementation in Mobile Ad Hoc Networks Channel Hopping Algorithm Implementation in Mobile Ad Hoc Networks G.Sirisha 1, D.Tejaswi 2, K.Priyanka 3 Assistant Professor, Department of Electronics and Communications Engineering, Shri Vishnu Engineering

More information

A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks

A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks Eiman Alotaibi, Sumit Roy Dept. of Electrical Engineering U. Washington Box 352500 Seattle, WA 98195 eman76,roy@ee.washington.edu

More information

Joint Spectrum and Power Allocation for Inter-Cell Spectrum Sharing in Cognitive Radio Networks

Joint Spectrum and Power Allocation for Inter-Cell Spectrum Sharing in Cognitive Radio Networks Joint Spectrum and Power Allocation for Inter-Cell Spectrum Sharing in Cognitive Radio Networks Won-Yeol Lee and Ian F. Akyildiz Broadband Wireless Networking Laboratory School of Electrical and Computer

More information

/13/$ IEEE

/13/$ IEEE A Game-Theoretical Anti-Jamming Scheme for Cognitive Radio Networks Changlong Chen and Min Song, University of Toledo ChunSheng Xin, Old Dominion University Jonathan Backens, Old Dominion University Abstract

More information

Opportunistic Routing in Wireless Mesh Networks

Opportunistic Routing in Wireless Mesh Networks Opportunistic Routing in Wireless Mesh Networks Amir arehshoorzadeh amir@ac.upc.edu Llorenç Cerdá-Alabern llorenc@ac.upc.edu Vicent Pla vpla@dcom.upv.es August 31, 2012 Opportunistic Routing in Wireless

More information

Multi-Band Spectrum Allocation Algorithm Based on First-Price Sealed Auction

Multi-Band Spectrum Allocation Algorithm Based on First-Price Sealed Auction BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 1 Sofia 2017 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2017-0008 Multi-Band Spectrum Allocation

More information

Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users

Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users Y.Li, X.Wang, X.Tian and X.Liu Shanghai Jiaotong University Scaling Laws for Cognitive Radio Network with Heterogeneous

More information

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background

More information

Resource Management in QoS-Aware Wireless Cellular Networks

Resource Management in QoS-Aware Wireless Cellular Networks Resource Management in QoS-Aware Wireless Cellular Networks Zhi Zhang Dept. of Electrical and Computer Engineering Colorado State University April 24, 2009 Zhi Zhang (ECE CSU) Resource Management in Wireless

More information

Low Overhead Spectrum Allocation and Secondary Access in Cognitive Radio Networks

Low Overhead Spectrum Allocation and Secondary Access in Cognitive Radio Networks Low Overhead Spectrum Allocation and Secondary Access in Cognitive Radio Networks Yee Ming Chen Department of Industrial Engineering and Management Yuan Ze University, Taoyuan Taiwan, Republic of China

More information

Downlink Erlang Capacity of Cellular OFDMA

Downlink Erlang Capacity of Cellular OFDMA Downlink Erlang Capacity of Cellular OFDMA Gauri Joshi, Harshad Maral, Abhay Karandikar Department of Electrical Engineering Indian Institute of Technology Bombay Powai, Mumbai, India 400076. Email: gaurijoshi@iitb.ac.in,

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 ISSN Md. Delwar Hossain

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 ISSN Md. Delwar Hossain International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 732 A Neighbor Discovery Approach for Cognitive Radio Network Using intersect Sequence Based Channel Rendezvous

More information

Capacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks

Capacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (TO APPEAR) Capacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks SubodhaGunawardena, Student Member, IEEE, and Weihua Zhuang,

More information

Energy-Balanced Cooperative Routing in Multihop Wireless Ad Hoc Networks

Energy-Balanced Cooperative Routing in Multihop Wireless Ad Hoc Networks Energy-Balanced Cooperative Routing in Multihop Wireless Ad Hoc Networs Siyuan Chen Minsu Huang Yang Li Ying Zhu Yu Wang Department of Computer Science, University of North Carolina at Charlotte, Charlotte,

More information

Adaptation of MAC Layer for QoS in WSN

Adaptation of MAC Layer for QoS in WSN Adaptation of MAC Layer for QoS in WSN Sukumar Nandi and Aditya Yadav IIT Guwahati Abstract. In this paper, we propose QoS aware MAC protocol for Wireless Sensor Networks. In WSNs, there can be two types

More information

Achievable Transmission Capacity of Cognitive Radio Networks with Cooperative Relaying

Achievable Transmission Capacity of Cognitive Radio Networks with Cooperative Relaying Achievable Transmission Capacity of Cognitive Radio Networks with Cooperative Relaying Xiuying Chen, Tao Jing, Yan Huo, Wei Li 2, Xiuzhen Cheng 2, Tao Chen 3 School of Electronics and Information Engineering,

More information

Accessing the Hidden Available Spectrum in Cognitive Radio Networks under GSM-based Primary Networks

Accessing the Hidden Available Spectrum in Cognitive Radio Networks under GSM-based Primary Networks Accessing the Hidden Available Spectrum in Cognitive Radio Networks under GSM-based Primary Networks Antara Hom Chowdhury, Yi Song, and Chengzong Pang Department of Electrical Engineering and Computer

More information

Low-Latency Multi-Source Broadcast in Radio Networks

Low-Latency Multi-Source Broadcast in Radio Networks Low-Latency Multi-Source Broadcast in Radio Networks Scott C.-H. Huang City University of Hong Kong Hsiao-Chun Wu Louisiana State University and S. S. Iyengar Louisiana State University In recent years

More information

Cooperative Broadcast for Maximum Network Lifetime. Ivana Maric and Roy Yates

Cooperative Broadcast for Maximum Network Lifetime. Ivana Maric and Roy Yates Cooperative Broadcast for Maximum Network Lifetime Ivana Maric and Roy Yates Wireless Multihop Network Broadcast N nodes Source transmits at rate R Messages are to be delivered to all the nodes Nodes can

More information

Color of Interference and Joint Encoding and Medium Access in Large Wireless Networks

Color of Interference and Joint Encoding and Medium Access in Large Wireless Networks Color of Interference and Joint Encoding and Medium Access in Large Wireless Networks Nithin Sugavanam, C. Emre Koksal, Atilla Eryilmaz Department of Electrical and Computer Engineering The Ohio State

More information

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. XX, NO. X, AUGUST 20XX 1

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. XX, NO. X, AUGUST 20XX 1 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. XX, NO. X, AUGUST 0XX 1 Greenput: a Power-saving Algorithm That Achieves Maximum Throughput in Wireless Networks Cheng-Shang Chang, Fellow, IEEE, Duan-Shin Lee,

More information

Almost Optimal Dynamically-Ordered Multi-Channel Accessing for Cognitive Networks

Almost Optimal Dynamically-Ordered Multi-Channel Accessing for Cognitive Networks Almost Optimal Dynamically-Ordered Multi-Channel Accessing for Cognitive Networks Bowen Li, Panlong Yang, Xiang-Yang Li, Shaojie Tang, Yunhao Liu, Qihui Wu Institute of Communication Engineering, PLAUST

More information

FULL-DUPLEX COGNITIVE RADIO: ENHANCING SPECTRUM USAGE MODEL

FULL-DUPLEX COGNITIVE RADIO: ENHANCING SPECTRUM USAGE MODEL FULL-DUPLEX COGNITIVE RADIO: ENHANCING SPECTRUM USAGE MODEL Abhinav Lall 1, O. P. Singh 2, Ashish Dixit 3 1,2,3 Department of Electronics and Communication Engineering, ASET. Amity University Lucknow Campus.(India)

More information

Distributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes

Distributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes 7th Mediterranean Conference on Control & Automation Makedonia Palace, Thessaloniki, Greece June 4-6, 009 Distributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes Theofanis

More information

Multi-Radio Channel Detecting Jamming Attack Against Enhanced Jump-Stay Based Rendezvous in Cognitive Radio Networks

Multi-Radio Channel Detecting Jamming Attack Against Enhanced Jump-Stay Based Rendezvous in Cognitive Radio Networks Multi-Radio Channel Detecting Jamming Attack Against Enhanced Jump-Stay Based Rendezvous in Cognitive Radio Networks Yang Gao 1, Zhaoquan Gu 1, Qiang-Sheng Hua 2, Hai Jin 2 1 Institute for Interdisciplinary

More information

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 10, OCTOBER 2007 Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution Yingbin Liang, Member, IEEE, Venugopal V Veeravalli, Fellow,

More information

OPPORTUNISTIC SPECTRUM ACCESS IN MULTI-USER MULTI-CHANNEL COGNITIVE RADIO NETWORKS

OPPORTUNISTIC SPECTRUM ACCESS IN MULTI-USER MULTI-CHANNEL COGNITIVE RADIO NETWORKS 9th European Signal Processing Conference (EUSIPCO 0) Barcelona, Spain, August 9 - September, 0 OPPORTUNISTIC SPECTRUM ACCESS IN MULTI-USER MULTI-CHANNEL COGNITIVE RADIO NETWORKS Sachin Shetty, Kodzo Agbedanu,

More information

CS434/534: Topics in Networked (Networking) Systems

CS434/534: Topics in Networked (Networking) Systems CS434/534: Topics in Networked (Networking) Systems Wireless Foundation: Wireless Mesh Networks Yang (Richard) Yang Computer Science Department Yale University 08A Watson Email: yry@cs.yale.edu http://zoo.cs.yale.edu/classes/cs434/

More information

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Fine-grained Channel Access in Wireless LAN Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Physical-layer data rate PHY layer data rate in WLANs is increasing rapidly Wider channel

More information

Forced Spectrum Access Termination Probability Analysis Under Restricted Channel Handoff

Forced Spectrum Access Termination Probability Analysis Under Restricted Channel Handoff Forced Spectrum Access Termination Probability Analysis Under Restricted Channel Handoff MohammadJavad NoroozOliaee, Bechir Hamdaoui, Taieb Znati, Mohsen Guizani Oregon State University, noroozom@onid.edu,

More information

Scheduling Data Collection with Dynamic Traffic Patterns in Wireless Sensor Networks

Scheduling Data Collection with Dynamic Traffic Patterns in Wireless Sensor Networks Scheduling Data Collection with Dynamic Traffic Patterns in Wireless Sensor Networks Wenbo Zhao and Xueyan Tang School of Computer Engineering, Nanyang Technological University, Singapore 639798 Email:

More information

Common Control Channel Allocation in Cognitive Radio Networks through UWB Multi-hop Communications

Common Control Channel Allocation in Cognitive Radio Networks through UWB Multi-hop Communications The first Nordic Workshop on Cross-Layer Optimization in Wireless Networks at Levi, Finland Common Control Channel Allocation in Cognitive Radio Networks through UWB Multi-hop Communications Ahmed M. Masri

More information

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Shih-Hsien Yang, Hung-Wei Tseng, Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,

More information

Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks

Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks Wenkai Wang, Husheng Li, Yan (Lindsay) Sun, and Zhu Han Department of Electrical, Computer and Biomedical Engineering University

More information

SPECTRUM resources are scarce and fixed spectrum allocation

SPECTRUM resources are scarce and fixed spectrum allocation Hedonic Coalition Formation Game for Cooperative Spectrum Sensing and Channel Access in Cognitive Radio Networks Xiaolei Hao, Man Hon Cheung, Vincent W.S. Wong, Senior Member, IEEE, and Victor C.M. Leung,

More information

Distributed Game Theoretic Optimization Of Frequency Selective Interference Channels: A Cross Layer Approach

Distributed Game Theoretic Optimization Of Frequency Selective Interference Channels: A Cross Layer Approach 2010 IEEE 26-th Convention of Electrical and Electronics Engineers in Israel Distributed Game Theoretic Optimization Of Frequency Selective Interference Channels: A Cross Layer Approach Amir Leshem and

More information

A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks

A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks Peter Marbach, and Atilla Eryilmaz Dept. of Computer Science, University of Toronto Email: marbach@cs.toronto.edu

More information

Chapter 10. User Cooperative Communications

Chapter 10. User Cooperative Communications Chapter 10 User Cooperative Communications 1 Outline Introduction Relay Channels User-Cooperation in Wireless Networks Multi-Hop Relay Channel Summary 2 Introduction User cooperative communication is a

More information

Secondary Transmission Profile for a Single-band Cognitive Interference Channel

Secondary Transmission Profile for a Single-band Cognitive Interference Channel Secondary Transmission rofile for a Single-band Cognitive Interference Channel Debashis Dash and Ashutosh Sabharwal Department of Electrical and Computer Engineering, Rice University Email:{ddash,ashu}@rice.edu

More information

Time Efficient Data Aggregation Scheduling in Cognitive Radio Networks

Time Efficient Data Aggregation Scheduling in Cognitive Radio Networks Time Efficient Data Aggregation Scheduling in Cognitive Radio Networks Mingyuan Yan, Shouling Ji,, and Zhipeng Cai Department of Computer Science, Georgia State University, Atlanta, Georgia 333, USA Email:

More information

Wireless Communication

Wireless Communication Wireless Communication Systems @CS.NCTU Lecture 9: MAC Protocols for WLANs Fine-Grained Channel Access in Wireless LAN (SIGCOMM 10) Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 Physical-Layer Data Rate PHY

More information

SENSOR PLACEMENT FOR MAXIMIZING LIFETIME PER UNIT COST IN WIRELESS SENSOR NETWORKS

SENSOR PLACEMENT FOR MAXIMIZING LIFETIME PER UNIT COST IN WIRELESS SENSOR NETWORKS SENSOR PACEMENT FOR MAXIMIZING IFETIME PER UNIT COST IN WIREESS SENSOR NETWORKS Yunxia Chen, Chen-Nee Chuah, and Qing Zhao Department of Electrical and Computer Engineering University of California, Davis,

More information

EasyChair Preprint. A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network

EasyChair Preprint. A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network EasyChair Preprint 78 A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network Yuzhou Liu and Wuwen Lai EasyChair preprints are intended for rapid dissemination of research results and

More information

A Practical Approach to Bitrate Control in Wireless Mesh Networks using Wireless Network Utility Maximization

A Practical Approach to Bitrate Control in Wireless Mesh Networks using Wireless Network Utility Maximization A Practical Approach to Bitrate Control in Wireless Mesh Networks using Wireless Network Utility Maximization EE359 Course Project Mayank Jain Department of Electrical Engineering Stanford University Introduction

More information

Data Dissemination in Wireless Sensor Networks

Data Dissemination in Wireless Sensor Networks Data Dissemination in Wireless Sensor Networks Philip Levis UC Berkeley Intel Research Berkeley Neil Patel UC Berkeley David Culler UC Berkeley Scott Shenker UC Berkeley ICSI Sensor Networks Sensor networks

More information

Cognitive Relaying and Opportunistic Spectrum Sensing in Unlicensed Multiple Access Channels

Cognitive Relaying and Opportunistic Spectrum Sensing in Unlicensed Multiple Access Channels Cognitive Relaying and Opportunistic Spectrum Sensing in Unlicensed Multiple Access Channels Jonathan Gambini 1, Osvaldo Simeone 2 and Umberto Spagnolini 1 1 DEI, Politecnico di Milano, Milan, I-20133

More information

Information-Theoretic Study on Routing Path Selection in Two-Way Relay Networks

Information-Theoretic Study on Routing Path Selection in Two-Way Relay Networks Information-Theoretic Study on Routing Path Selection in Two-Way Relay Networks Shanshan Wu, Wenguang Mao, and Xudong Wang UM-SJTU Joint Institute, Shanghai Jiao Tong University, Shanghai, China Email:

More information

How (Information Theoretically) Optimal Are Distributed Decisions?

How (Information Theoretically) Optimal Are Distributed Decisions? How (Information Theoretically) Optimal Are Distributed Decisions? Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr

More information

Cooperative Spectrum Sharing in Cognitive Radio Networks: A Game-Theoretic Approach

Cooperative Spectrum Sharing in Cognitive Radio Networks: A Game-Theoretic Approach Cooperative Spectrum Sharing in Cognitive Radio Networks: A Game-Theoretic Approach Haobing Wang, Lin Gao, Xiaoying Gan, Xinbing Wang, Ekram Hossain 2. Department of Electronic Engineering, Shanghai Jiao

More information

Opportunistic Spectrum Access with Channel Switching Cost for Cognitive Radio Networks

Opportunistic Spectrum Access with Channel Switching Cost for Cognitive Radio Networks This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 211 proceedings Opportunistic Spectrum Access with Channel

More information

Superimposed Code Based Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks

Superimposed Code Based Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks Superimposed Code Based Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks ABSTRACT Kai Xing & Xiuzhen Cheng & Liran Ma Department of Computer Science The George Washington University

More information

Multihop Routing in Ad Hoc Networks

Multihop Routing in Ad Hoc Networks Multihop Routing in Ad Hoc Networks Dr. D. Torrieri 1, S. Talarico 2 and Dr. M. C. Valenti 2 1 U.S Army Research Laboratory, Adelphi, MD 2 West Virginia University, Morgantown, WV Nov. 18 th, 20131 Outline

More information

Using Reconfigurable Radios to Increase Throughput in Wireless Sensor Networks

Using Reconfigurable Radios to Increase Throughput in Wireless Sensor Networks Using Reconfigurable Radios to Increase Throughput in Wireless Sensor Networks Mihaela Cardei and Yueshi Wu Department of Computer and Electrical Engineering and Computer Science Florida Atlantic University

More information

Data Gathering. Chapter 4. Ad Hoc and Sensor Networks Roger Wattenhofer 4/1

Data Gathering. Chapter 4. Ad Hoc and Sensor Networks Roger Wattenhofer 4/1 Data Gathering Chapter 4 Ad Hoc and Sensor Networks Roger Wattenhofer 4/1 Environmental Monitoring (PermaSense) Understand global warming in alpine environment Harsh environmental conditions Swiss made

More information

The Use of A Mobile Sink for Quality Data Collection in Energy Harvesting Sensor Networks

The Use of A Mobile Sink for Quality Data Collection in Energy Harvesting Sensor Networks 3 IEEE Wireless Communications and Networking Conference (WCNC): NETWORKS The Use of A Mobile Sink for Quality Data Collection in Energy Harvesting Sensor Networks Xiaojiang Ren Weifa Liang Research School

More information

Cooperative Spectrum Sensing in Cognitive Radio

Cooperative Spectrum Sensing in Cognitive Radio Cooperative Spectrum Sensing in Cognitive Radio Project of the Course : Software Defined Radio Isfahan University of Technology Spring 2010 Paria Rezaeinia Zahra Ashouri 1/54 OUTLINE Introduction Cognitive

More information

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN Wireless LANs Mobility Flexibility Hard to wire areas Reduced cost of wireless systems Improved performance of wireless systems Wireless LAN Applications LAN Extension Cross building interconnection Nomadic

More information

Cluster-based Control Channel Allocation in Opportunistic Cognitive Radio Networks

Cluster-based Control Channel Allocation in Opportunistic Cognitive Radio Networks IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. X, NO. X, 1 Cluster-based Control Channel Allocation in Opportunistic Cognitive Radio Networks Sisi Liu, Student Member, IEEE, Loukas Lazos, Member, IEEE, and

More information

A Two-Layer Coalitional Game among Rational Cognitive Radio Users

A Two-Layer Coalitional Game among Rational Cognitive Radio Users A Two-Layer Coalitional Game among Rational Cognitive Radio Users This research was supported by the NSF grant CNS-1018447. Yuan Lu ylu8@ncsu.edu Alexandra Duel-Hallen sasha@ncsu.edu Department of Electrical

More information

CogLEACH: A Spectrum Aware Clustering Protocol for Cognitive Radio Sensor Networks

CogLEACH: A Spectrum Aware Clustering Protocol for Cognitive Radio Sensor Networks CogLEACH: A Spectrum Aware Clustering Protocol for Cognitive Radio Sensor Networks Rashad M. Eletreby, Hany M. Elsayed and Mohamed M. Khairy Department of Electronics and Electrical Communications Engineering,

More information

Improving Reader Performance of an UHF RFID System Using Frequency Hopping Techniques

Improving Reader Performance of an UHF RFID System Using Frequency Hopping Techniques 1 Improving Reader Performance of an UHF RFID System Using Frequency Hopping Techniques Ju-Yen Hung and Venkatesh Sarangan *, MSCS 219, Computer Science Department, Oklahoma State University, Stillwater,

More information

Efficient Multihop Broadcast for Wideband Systems

Efficient Multihop Broadcast for Wideband Systems Efficient Multihop Broadcast for Wideband Systems Ivana Maric WINLAB, Rutgers University ivanam@winlab.rutgers.edu Roy Yates WINLAB, Rutgers University ryates@winlab.rutgers.edu Abstract In this paper

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #4: Medium Access Control Power/CarrierSense Control, Multi-Channel, Directional Antenna Tamer Nadeem Dept. of Computer Science Power & Carrier Sense

More information

LOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS

LOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.955

More information

Chapter 12. Cross-Layer Optimization for Multi- Hop Cognitive Radio Networks

Chapter 12. Cross-Layer Optimization for Multi- Hop Cognitive Radio Networks Chapter 12 Cross-Layer Optimization for Multi- Hop Cognitive Radio Networks 1 Outline CR network (CRN) properties Mathematical models at multiple layers Case study 2 Traditional Radio vs CR Traditional

More information

Achieving Network Consistency. Octav Chipara

Achieving Network Consistency. Octav Chipara Achieving Network Consistency Octav Chipara Reminders Homework is postponed until next class if you already turned in your homework, you may resubmit Please send me your peer evaluations 2 Next few lectures

More information

A new connectivity model for Cognitive Radio Ad-Hoc Networks: definition and exploiting for routing design

A new connectivity model for Cognitive Radio Ad-Hoc Networks: definition and exploiting for routing design A new connectivity model for Cognitive Radio Ad-Hoc Networks: definition and exploiting for routing design PhD candidate: Anna Abbagnale Tutor: Prof. Francesca Cuomo Dottorato di Ricerca in Ingegneria

More information

Maximizing Throughput When Achieving Time Fairness in Multi-Rate Wireless LANs

Maximizing Throughput When Achieving Time Fairness in Multi-Rate Wireless LANs Maximizing Throughput When Achieving Time Fairness in Multi-Rate Wireless LANs Yuan Le, Liran Ma,WeiCheng,XiuzhenCheng,BiaoChen Department of Computer Science, The George Washington University, Washington

More information

Learning and Decision Making with Negative Externality for Opportunistic Spectrum Access

Learning and Decision Making with Negative Externality for Opportunistic Spectrum Access Globecom - Cognitive Radio and Networks Symposium Learning and Decision Making with Negative Externality for Opportunistic Spectrum Access Biling Zhang,, Yan Chen, Chih-Yu Wang, 3, and K. J. Ray Liu Department

More information

Random Access Protocols for Collaborative Spectrum Sensing in Multi-Band Cognitive Radio Networks

Random Access Protocols for Collaborative Spectrum Sensing in Multi-Band Cognitive Radio Networks MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com Random Access Protocols for Collaborative Spectrum Sensing in Multi-Band Cognitive Radio Networks Chen, R-R.; Teo, K.H.; Farhang-Boroujeny.B.;

More information

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 58, NO. 3, MARCH

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 58, NO. 3, MARCH IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 58, NO. 3, MARCH 2010 1401 Decomposition Principles and Online Learning in Cross-Layer Optimization for Delay-Sensitive Applications Fangwen Fu, Student Member,

More information

Optimal Utility-Based Resource Allocation for OFDM Networks with Multiple Types of Traffic

Optimal Utility-Based Resource Allocation for OFDM Networks with Multiple Types of Traffic Optimal Utility-Based Resource Allocation for OFDM Networks with Multiple Types of Traffic Mohammad Katoozian, Keivan Navaie Electrical and Computer Engineering Department Tarbiat Modares University, Tehran,

More information

Optimum Power Allocation in Cooperative Networks

Optimum Power Allocation in Cooperative Networks Optimum Power Allocation in Cooperative Networks Jaime Adeane, Miguel R.D. Rodrigues, and Ian J. Wassell Laboratory for Communication Engineering Department of Engineering University of Cambridge 5 JJ

More information